SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
The iStorage datashur is the world’s most secure, easy to use and affordable USB flash drive, employing PIN code access
with military grade AES 256-bit hardware encryption. The datashur incorporates a rechargeable battery allowing the user to
enter a 7-15 digit PIN onto the on-board keypad before connecting the drive to the USB port.
All data transferred to the datashur is encrypted in real-time with the built in hardware encryption engine and is protected from
unauthorised access or if your datashur is lost or stolen. The datashur automatically locks when unplugged from the host
computer or power to the USB port is turned off.
The datashur operates straight out of the box, does not require any software or drivers to be installed and is compatible with
PCs, MACs, Linux and embedded systems. The datashur delivers drag and drop encryption, plug and play simplicity and can
be used with any off the shelf backup software.
The datashur can be configured with independent User and Admin PINs, making it perfect for corporate and government
deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which will then clear the old User
PIN and allow the User to set a new PIN. The datashur also incorporates a drive reset feature which clears both User and
Admin PINs, destroys the data, creates a new randomly generated encryption key and allows the drive to be reused. The
datashur is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the
drive as and when required.
“Finally, the arrival of
an ultra-secure, easy
to use and affordable
USB Flash Drive”
As the iStorage datashur is unlocked via the on-board keypad and not via a
keyboard, it is not vulnerable to software/hardware based key-loggers or brute
force attacks. The datashur protects your data with a “Brute Force Hack
Defence Mechanism”, which deletes the encryption key and destroys all stored
data if the incorrect PIN is entered a total of 10 consecutive times.
Features at a glance:
iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England
Tel: + 44 (0) 118 973 9399 - Email: sales@istorage-africa.com - Web: www.istorage-africa.com
• FIPS 140-2 Level 3 Certified (Certificate Number 1873)
• Capacities of 4GB, 8GB & 16GB
• PIN activated 7-15 digits - Alphanumeric keypad use a memorable number
or word for your PIN
• Military grade Full-disk AES 256-bit CBC Hardware Encryption
• Crypto-parameters protected with SHA-256 hashing
• Dust and water resistant durable aluminium housing
• Tamper evident and resistant
• Supports Admin and User independent PINs
• Auto-lock on removal
• Drive reset destroys data and recovers use of drive
• OS and platform independent – compatible with Windows, Mac, Linux and
embedded systems
• No software or drivers required
• Works with any USB/USB On-The-Go devices
• Brute Force Hack Defence Mechanism
• Customisation service available – contact iStorage for further
information
• 3-Year warranty
Why choose datashur?
Did you know that millions of flash drives are lost or stolen every year and this figure is rising. Have you ever considered the
impact of losing your non-encrypted USB flash drive? Your data would be at the mercy of anyone who stumbles across it.
Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the
downfall of a business, embarrassment, job losses and adverse media attention. The iStorage datashur can protect you
against all of this.
The datashur is an investment that will last for years. Its rugged, extruded aluminium, water proof casing is tamper evident and
protects it against physical damage. The internal drive components are also sealed with a tamper proof coating.
Simple to use
Step 1 Step 2 Step 3
Enter your PIN Plug & Play Unplug to automatically lock
Technical Specifications
Capacity 4GB, 8GB, 16GB ans 32GB
Speed
Up to 27MB per second read
Up to 24MB per second write
Dimensions (drive with sleeve) 80mm x 20mm x 10.5mm
Dimensions (drive without sleeve) 78mm x 18mm x 10.5mm
Weight 25 grams
Waterproof MIL-STD-810F
Hardware USB2 high speed - compatible with USB1 & USB3
Operating System compatibility Windows, MAC OS, Linux, Android & Symbian
Hardware Data Encryption AES Cipher-Block Chained mode
Encryption Keys 256-bit Hardware
Hashing 256-bit SHA
All trademarks and brand
names are the property of
their respective owners
iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England
Tel: +44 (0) 118 973 9399 – Email: sales@istorage-africa.com – web: www.istorage-africa.com
iStorage datashur is developed and
manufactured by iStorage Ltd. and is
based on DataLock® technology licensed
from ClevX, LLC

Weitere ähnliche Inhalte

Mehr von Kingfin Enterprises Limited

Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation. Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation. Kingfin Enterprises Limited
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionKingfin Enterprises Limited
 
How to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsHow to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsKingfin Enterprises Limited
 
Microsoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideMicrosoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideKingfin Enterprises Limited
 

Mehr von Kingfin Enterprises Limited (20)

Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Diskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive DatasheetDiskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive Datasheet
 
Diskashur Hard Disk Drives Datasheet
Diskashur Hard Disk Drives DatasheetDiskashur Hard Disk Drives Datasheet
Diskashur Hard Disk Drives Datasheet
 
VoIP for Beginners
VoIP for BeginnersVoIP for Beginners
VoIP for Beginners
 
Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation. Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation.
 
A Smarter Path to ERP Selection
A Smarter Path to ERP SelectionA Smarter Path to ERP Selection
A Smarter Path to ERP Selection
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
 
Fujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product IntroductionFujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product Introduction
 
The 7 types of Power Problems
The 7 types of Power ProblemsThe 7 types of Power Problems
The 7 types of Power Problems
 
ASUS VivoBook S400
ASUS VivoBook S400ASUS VivoBook S400
ASUS VivoBook S400
 
How to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsHow to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT Environments
 
Fujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i BrochureFujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i Brochure
 
Symantec Partner Certificate
Symantec Partner CertificateSymantec Partner Certificate
Symantec Partner Certificate
 
Dell registered partner certificate
Dell registered partner certificateDell registered partner certificate
Dell registered partner certificate
 
MOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESSMOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESS
 
Microsoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideMicrosoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter Guide
 
How Unified Communications Pays For Itself
How Unified Communications Pays For ItselfHow Unified Communications Pays For Itself
How Unified Communications Pays For Itself
 
Fujitsu STYLISTIC Q702 Tablet PC
Fujitsu STYLISTIC Q702 Tablet PCFujitsu STYLISTIC Q702 Tablet PC
Fujitsu STYLISTIC Q702 Tablet PC
 
Fujitsu PRIMERGY RX200 S7
Fujitsu PRIMERGY RX200 S7Fujitsu PRIMERGY RX200 S7
Fujitsu PRIMERGY RX200 S7
 
Fujitsu PRIMERGY RX100 S7
Fujitsu PRIMERGY RX100 S7Fujitsu PRIMERGY RX100 S7
Fujitsu PRIMERGY RX100 S7
 

Kürzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Datashur PIN Code access flash disk datasheet

  • 1. The iStorage datashur is the world’s most secure, easy to use and affordable USB flash drive, employing PIN code access with military grade AES 256-bit hardware encryption. The datashur incorporates a rechargeable battery allowing the user to enter a 7-15 digit PIN onto the on-board keypad before connecting the drive to the USB port. All data transferred to the datashur is encrypted in real-time with the built in hardware encryption engine and is protected from unauthorised access or if your datashur is lost or stolen. The datashur automatically locks when unplugged from the host computer or power to the USB port is turned off. The datashur operates straight out of the box, does not require any software or drivers to be installed and is compatible with PCs, MACs, Linux and embedded systems. The datashur delivers drag and drop encryption, plug and play simplicity and can be used with any off the shelf backup software. The datashur can be configured with independent User and Admin PINs, making it perfect for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which will then clear the old User PIN and allow the User to set a new PIN. The datashur also incorporates a drive reset feature which clears both User and Admin PINs, destroys the data, creates a new randomly generated encryption key and allows the drive to be reused. The datashur is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as and when required. “Finally, the arrival of an ultra-secure, easy to use and affordable USB Flash Drive” As the iStorage datashur is unlocked via the on-board keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. The datashur protects your data with a “Brute Force Hack Defence Mechanism”, which deletes the encryption key and destroys all stored data if the incorrect PIN is entered a total of 10 consecutive times. Features at a glance: iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England Tel: + 44 (0) 118 973 9399 - Email: sales@istorage-africa.com - Web: www.istorage-africa.com • FIPS 140-2 Level 3 Certified (Certificate Number 1873) • Capacities of 4GB, 8GB & 16GB • PIN activated 7-15 digits - Alphanumeric keypad use a memorable number or word for your PIN • Military grade Full-disk AES 256-bit CBC Hardware Encryption • Crypto-parameters protected with SHA-256 hashing • Dust and water resistant durable aluminium housing • Tamper evident and resistant • Supports Admin and User independent PINs • Auto-lock on removal • Drive reset destroys data and recovers use of drive • OS and platform independent – compatible with Windows, Mac, Linux and embedded systems • No software or drivers required • Works with any USB/USB On-The-Go devices • Brute Force Hack Defence Mechanism • Customisation service available – contact iStorage for further information • 3-Year warranty
  • 2. Why choose datashur? Did you know that millions of flash drives are lost or stolen every year and this figure is rising. Have you ever considered the impact of losing your non-encrypted USB flash drive? Your data would be at the mercy of anyone who stumbles across it. Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage datashur can protect you against all of this. The datashur is an investment that will last for years. Its rugged, extruded aluminium, water proof casing is tamper evident and protects it against physical damage. The internal drive components are also sealed with a tamper proof coating. Simple to use Step 1 Step 2 Step 3 Enter your PIN Plug & Play Unplug to automatically lock Technical Specifications Capacity 4GB, 8GB, 16GB ans 32GB Speed Up to 27MB per second read Up to 24MB per second write Dimensions (drive with sleeve) 80mm x 20mm x 10.5mm Dimensions (drive without sleeve) 78mm x 18mm x 10.5mm Weight 25 grams Waterproof MIL-STD-810F Hardware USB2 high speed - compatible with USB1 & USB3 Operating System compatibility Windows, MAC OS, Linux, Android & Symbian Hardware Data Encryption AES Cipher-Block Chained mode Encryption Keys 256-bit Hardware Hashing 256-bit SHA All trademarks and brand names are the property of their respective owners iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England Tel: +44 (0) 118 973 9399 – Email: sales@istorage-africa.com – web: www.istorage-africa.com iStorage datashur is developed and manufactured by iStorage Ltd. and is based on DataLock® technology licensed from ClevX, LLC